| Publication | Date of Publication | Type |
|---|
| Threshold linear secret sharing to the rescue of MPC-in-the-head | 2024-08-30 | Paper |
| Unifying freedom and separation for tight probing-secure composition | 2024-02-02 | Paper |
| Higher-order DCA against standard side-channel countermeasures | 2023-10-20 | Paper |
| Zero-knowledge protocols for the subset sum problem from MPC-in-the-head with rejection | 2023-08-16 | Paper |
| Syndrome decoding in the head: shorter signatures from zero-knowledge proofs | 2023-06-28 | Paper |
| Dynamic random probing expansion with quasi linear asymptotic complexity | 2023-05-12 | Paper |
| Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature | 2023-04-21 | Paper |
| Random probing security: verification, composition, expansion and new constructions | 2022-11-09 | Paper |
| On the power of expansion: more efficient constructions in the random probing model | 2021-12-08 | Paper |
| Tornado: automatic generation of probing-secure masked bitsliced implementations | 2021-12-01 | Paper |
| Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison | 2020-07-20 | Paper |
| Generalized polynomial decomposition for S-boxes with application to side-channel countermeasures | 2020-06-24 | Paper |
| Tight private circuits: achieving probing security with the least refreshing | 2019-01-23 | Paper |
| How to securely compute with noisy leakage in quasilinear complexity | 2019-01-23 | Paper |
| Lattice attacks against elliptic-curve signatures with blinded scalar multiplication | 2018-02-16 | Paper |
| On the multiplicative complexity of Boolean functions and bitsliced higher-order masking | 2018-02-14 | Paper |
| Statistical Analysis of Second Order Differential Power Analysis | 2017-08-08 | Paper |
| How fast can higher-order masking be in software? | 2017-06-13 | Paper |
| Algebraic decomposition for probing security | 2015-12-10 | Paper |
| Two attacks on a white-box AES implementation | 2015-10-01 | Paper |
| White-box security notions for symmetric encryption schemes | 2015-10-01 | Paper |
| Higher-order side channel security and mask refreshing | 2015-09-18 | Paper |
| How to Estimate the Success Rate of Higher-Order Side-Channel Attacks | 2015-07-21 | Paper |
| On the practical security of a leakage resilient masking scheme | 2014-03-28 | Paper |
| On double exponentiation for securing RSA against fault analysis | 2014-03-28 | Paper |
| SCARE of secret ciphers with SPN structures | 2013-12-10 | Paper |
| Differential fault analysis of DES | 2013-07-09 | Paper |
| Masking against Side-Channel Attacks: A Formal Security Proof | 2013-05-31 | Paper |
| Conversion of security proofs from one leakage model to another: a new issue | 2013-02-14 | Paper |
| Higher-order masking schemes for S-boxes | 2013-01-08 | Paper |
| Mutual information analysis: a comprehensive study | 2012-01-18 | Paper |
| Theoretical and practical aspects of mutual information-based side channel analysis | 2011-04-05 | Paper |
| Affine Masking against Higher-Order Side Channel Analysis | 2011-03-15 | Paper |
| Provably secure higher-order masking of AES | 2010-08-17 | Paper |
| Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers | 2009-11-10 | Paper |
| Differential Fault Analysis on DES Middle Rounds | 2009-11-10 | Paper |
| On the Exact Success Rate of Side Channel Analysis in the Gaussian Model | 2009-11-03 | Paper |
| Securing RSA against Fault Analysis by Double Addition Chain Exponentiation | 2009-04-29 | Paper |
| Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis | 2008-09-18 | Paper |
| Side Channel Cryptanalysis of a Higher Order Masking Scheme | 2008-09-16 | Paper |